ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies.

Slides:



Advertisements
Similar presentations
Multirate adaptive awake-sleep cycle in hierarchical heterogeneous sensor network BY HELAL CHOWDHURY presented by : Helal Chowdhury Telecommunication laboratory,
Advertisements

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
5/2/2015 Wireless Sensor Networks COE 499 Sleep-based Topology Control II Tarek Sheltami KFUPM CCSE COE
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Introduction to Wireless Sensor Networks
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
1-1 Topology Control. 1-2 What’s topology control?
A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks Author : Lan Wang·Yang Xiao(2006) Presented by Yi Cheng Lin.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Topology Control.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Talha Naeem Qureshi Joint work with Tauseef Shah and Nadeem Javaid
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
MAC Protocols and Security in Ad hoc and Sensor Networks
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
07/21/2005 Senmetrics1 Xin Liu Computer Science Department University of California, Davis Joint work with P. Mohapatra On the Deployment of Wireless Sensor.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Mobile Ad hoc Networks Sleep-based Topology Control
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Topology Management in Ad hoc and Sensor Networks.
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
1 EnviroStore: A Cooperative Storage System for Disconnected Operation in Sensor Networks Liqian Luo, Chengdu Huang, Tarek Abdelzaher John Stankovic INFOCOM.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
11/15/20051 ASCENT: Adaptive Self- Configuring sEnsor Networks Topologies Authors: Alberto Cerpa, Deborah Estrin Presented by Suganthie Shanmugam.
Minimizing Energy Consumption in Sensor Networks Using a Wakeup Radio Matthew J. Miller and Nitin H. Vaidya IEEE WCNC March 25, 2004.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
ELECTIONEL ECTI ON ELECTION: Energy-efficient and Low- latEncy sCheduling Technique for wIreless sensOr Networks Shamim Begum, Shao-Cheng Wang, Bhaskar.
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
Computer Network Lab. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks SenSys ’ 03 Xiaorui Wang, Guoliang Xing, Yuanfang.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim, Dept. of Electrical & Electronic Eng., Yonsei University;
Auto-configuration In Wireless Sensor Networks Nakjung Choi, Haeyong Kim, Minji Nam April Fools’ Day.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
MAC Protocols for Sensor Networks
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
In the name of God.
MAC Protocols for Sensor Networks
Wireless Sensor Networks
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
An Energy-efficient MAC protocol for Wireless Sensor Networks
IHP: Innovation for High Performance Microelectronics
Dominik Kaspar, Eunsook Kim, Carles Gomez, Carsten Bormann
Wireless LANs Wireless proliferating rapidly.
SENSYS Presented by Cheolki Lee
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Infer: A Bayesian Inference Approach towards Energy Efficient Data Collection in Dense Sensor Networks. G. Hartl and B.Li In Proc. of ICDCS Natalia.
Meshed Multipath Routing: An Efficient Strategy in Wireless Sensor Networks Swades DE Chunming QIAO Hongyi WU EE Dept.
Speaker : Lee Heon-Jong
Adaptive Topology Control for Ad-hoc Sensor Networks
Edinburgh Napier University
Presentation transcript:

ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies. Alberto Cerpa and Deborah Estrin, In Proceedings of the Twenty First International Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002), New York, NY, USA, June 23-27 2002. November 21, 2018 Haeyong Kim (hykim@mmlab.snu.ac.kr) Seoul National Univ.

Distributed sensor network scenario Ex) A habitat monitoring sensor network Deployed in a remote forest by dropping sensor nodes from a plane or by placing them by hand Ad-hoc deployment Cannot expect the sensor field to be deployed in a regular fashion Uniform deployment does not correspond to uniform connectivity Energy constraints Expend as little energy as possible to maximize network lifetime Unattended operation under dynamics Preclude manual configuration, pre-configuration Haeyong Kim (hykim@mmlab.snu.ac.kr) Seoul National Univ.

Assumptions Reacts when links experience high packet loss High enough node density to connect the entire region When node density is low, ASCENT mechanism does not applicable (generally, all nodes should be used to form an effective network) Does not consider partition (partition detection and repair techniques are leaved to future work) Haeyong Kim (hykim@mmlab.snu.ac.kr) Seoul National Univ.

Primary contributions Use of adaptive techniques Applications configure the underlying topology based on their needs while trying to save energy to extend network lifetime Use of self-configuring techniques React to operating conditions measured locally Use of adaptive techniques : Does not presume fairness, degree of connectivity or capacity required Haeyong Kim (hykim@mmlab.snu.ac.kr) Seoul National Univ.

ASCENT design ASCENT adaptively elects “active” nodes “passive” nodes Stay awake all the time and perform multi-hop packet routing “passive” nodes Periodically check if they should become active Two-hop network example Only some nodes are active. Very high message loss (because range) sending “help messages” passive neighbor nodes join the network Neighbor receive help message, it may decide to join the network (becomes an active neighbor) signals the existence of new active neighbor to other passive neighbors by sending a “neighbor announcement message” continues until the number of active nodes stabilizes on a certain value Delivery of data from source to sink more reliable Haeyong Kim (hykim@mmlab.snu.ac.kr) Seoul National Univ.

ASCENT state transitions Random timer turns on the nodes to avoid synchronization When a node starts, test state Exchange data and routing control messages and sets up a timer (Tt), sends neighbor announcement messages with node ID Before Tt expires, neighbors > NT (neighbor threshold) or DL (data loss rate) > DL before entering in the test state passive state Passive  test : active neighbor가 보낸 help 메시지. LT (loss threshold) Passive mode : overhear all packet (even if not addressed to the passive node)  gather information Haeyong Kim (hykim@mmlab.snu.ac.kr) Seoul National Univ.

ASCENT parameter tuning Choices left to the applications NT (neighbor threshold) the average degree of connectivity of the network Trade-off between the energy consumed and/or the level of interference vs. the desired sensing coverage LT (loss threshold) The maximum amount of data loss that an application can tolerate Application dependent temperature measurements vs tracking of a moving target Tt, Tp (timer of test state, passive state) Trade-off of power consumption vs. decision quality Ts (timer of sleep state) Trade-off of energy saving vs. reaction time to dynamics Level of interference = packet loss Tt, Tp : Robust decision in presence of transient paket losses, neighbor determination에 영향 Haeyong Kim (hykim@mmlab.snu.ac.kr) Seoul National Univ.

Neighbor and data loss determination Measured locally by each node while in passive and test state Each node increase the sequence number when each packet transmitted When a sequence number is skipped, loss is detected Assumes application data packets also have some mechanism to detect losses N이 커질수록 loss가 커지게 되므로, loss threshold도 같이 증가 시켜야만 합리적인 N값을 얻을 수 있다. 그렇지 않으면 active neighbor가 증가함에도 불구하고 N값은 줄어들 수가 있다. Haeyong Kim (hykim@mmlab.snu.ac.kr) Seoul National Univ.

Neighbor and data loss determination (cont’d) The number of active neighbors (N) The number of neighbors with link packet loss smaller than the neighbor loss threshold (NLS) NLS = 1- (1/N) This formula worked best N : the number of neighbors calculated in the previous cycle NLS : neighbor loss threshold Average data loss rate (DL) Calculated based on the application data packets Data losses are detected using data sequence numbers If the message was not received from any neighbor, it is considered a data loss Control messages are not considered Help, neighbor announcement and routing control Depending on the routing strategy, a node may receive multiple copies of the same application data packet. Haeyong Kim (hykim@mmlab.snu.ac.kr) Seoul National Univ.

ASCENT interactions with routing runs above link and MAC layer below routing layer is not a routing or data dissemination protocol decides which nodes should join the routing infrastructure Nodes become active or passive independent of routing protocol Does not use state gathered by the routing protocol Does not requires changing the routing state Test state (actively routing packets)  passive state (listen-only) Cause some packet loss Improvement : Traffic could be rerouted in advance by informing the routing protocol of ASCENT’s state changes Haeyong Kim (hykim@mmlab.snu.ac.kr) Seoul National Univ.

Conclusion ASCENT has the potential of ASCENT mechanisms were significant reduction of packet loss Increase in energy efficiency ASCENT mechanisms were responsive and stable under systematically varied conditions Future work Use of load balancing techniques to distribute the energy load Use of wider area links to detect network partitions Haeyong Kim (hykim@mmlab.snu.ac.kr) Seoul National Univ.